1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Eddi Din [679]
2 years ago
12

While engineers work to create computers that can understand us emotionally, ________ are also evolving toward a more human appe

arance. esp systems rfids affecting computing techniques computer systems?
Computers and Technology
1 answer:
aleksandrvk [35]2 years ago
8 0
While engineers work to create computers that can understand us emotionally, ________ are also evolving toward a more human appearance.

affecting computing techniques
You might be interested in
Teaching Siri or the Google Assistant how to recognize your voice by reading to it is an example of ________.
nata0808 [166]

Answer:

4. Supervised learning.

Explanation:

Supervised and Unsupervised learning are both learning approaches in machine learning. In other words, they are sub-branches in machine learning.

In supervised learning, an algorithm(a function) is used to map input(s) to output(s). The aim of supervised learning is to predict output variables for given input data using a mapping function. When an input is given, predictions can be made to get the output.

Unsupervised learning on the other hand is suitable when no output variables are needed. The only data needed are the inputs. In this type of learning, the system just keeps learning more about the inputs.

Special applications of supervised learning are in image recognition, speech recognition, financial analysis, neural networking, forecasting and a whole lot more.

Application of unsupervised learning is in pre-processing of data during exploratory analysis.

<em>Hope this helps!</em>

8 0
2 years ago
Question A low level distributed denial of service (DDoS) attack that involves SYN or SYN/ACK flooding describes what type of at
Morgarella [4.7K]

Answer:

TCP SYN flood

Explanation:

TCP SYN flood (a.k.a. SYN flood) is a type of Distributed Denial of Service (DDoS) attack that exploits part of the normal TCP three-way handshake to consume resources on the targeted server and render it unresponsive.

8 0
2 years ago
29
denis23 [38]

The correct answer is A it transfers control to the next loop in the program.


The most valid answer is that the break statement Exits the loop and continues executing the program, but assuming that there are other loops, the control of the program will go to them since the first loop is broken out of.


3 0
3 years ago
Gwen has a photo she’d like to display in her speech, but she forgot to digitize it. She only has a hard copy, and she doesn’t h
skelet666 [1.2K]

Answer:

A. Document camera

Explanation:

Document cameras, which are also known as visual presenters or visualisers, digital overheads, or docucams. They are real-time image capture devices for displaying an object to a large audience. Just like an opaque projector, a document camera is able to magnify and project the images of actual, three-dimensional objects, as well as transparencies. They are, simply put, high resolution web cams, that is mounted on arms so as to facilitate their placement over a page.

This makes it easier and convenient for a teacher, lecturer or presenter to write on a sheet of paper or to display a two or three-dimensional object while the audience watches.

In Theory, the document camera can be used to display all objects.

Gwen only needs to place her photo under a document camera and deliver her speech while the image will be displayed for the class.

5 0
2 years ago
Arrange the steps for conflict resolution in proper sequence.
VashaNatasha [74]

1.Clarify what the disagreement is

2. Establish a common goal for both parties

3. Discuss ways to meet the common goal 

4. Determine the barriers to the common goal

5. Agree on the best way to resolve the conflict

6. Acknowledge the agreed upon solution and determine the responsibilities each part has in the resolution 

8 0
3 years ago
Read 2 more answers
Other questions:
  • What benefit does internet have​
    11·1 answer
  • In order to make burger a chef needs the following ingredients one piece of chicken meat 3 lettuce leaves 6 tomato slices Write
    8·1 answer
  • What is the program that searches through data bases?
    10·1 answer
  • A negative effect of computer technology's role in creating images is that:
    13·2 answers
  • true of false one reason to move to a paperless society is that printers are becoming prohibitively expensive
    13·1 answer
  • Which option can be used to access more settings than are available in the Backstage view?
    5·1 answer
  • Which is a natural hazard that can cause extinctions? Choose all that apply.
    6·1 answer
  • Algorithm of how to calculate the area of a square.
    12·2 answers
  • What are the importance of Help and Support feature of Windows​
    6·1 answer
  • What is the difference between Brainly.com and Brainly.in? Ive been wondering because im not signed in under Brainly.in.
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!